咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 15 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 30 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 11 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 41 篇 elliptic curve d...
  • 5 篇 blockchain
  • 4 篇 public key crypt...
  • 4 篇 ecdsa
  • 4 篇 digital signatur...
  • 3 篇 lll algorithm
  • 3 篇 elliptic curve c...
  • 3 篇 security
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 elliptic curve d...
  • 2 篇 advanced encrypt...
  • 2 篇 safety applicati...
  • 2 篇 cooperative awar...
  • 2 篇 v2x communicatio...
  • 2 篇 authentication
  • 2 篇 secure hash algo...
  • 2 篇 key management
  • 2 篇 babai's nearest ...
  • 1 篇 pentanomial

机构

  • 2 篇 auckland univers...
  • 2 篇 aristotle univ t...
  • 1 篇 telecom paristec...
  • 1 篇 harbin inst tech...
  • 1 篇 ain shams univ f...
  • 1 篇 galgotias univ s...
  • 1 篇 univ jordan comp...
  • 1 篇 univ carthage in...
  • 1 篇 balqa appl univ ...
  • 1 篇 univ manitoba de...
  • 1 篇 elect & microele...
  • 1 篇 beijing inst tec...
  • 1 篇 chunghwa telecom...
  • 1 篇 southeast univ s...
  • 1 篇 misr int univ fa...
  • 1 篇 so illinois univ...
  • 1 篇 univ basrah basr...
  • 1 篇 koneru lakshmaia...
  • 1 篇 ryerson univ dep...
  • 1 篇 univ energy & na...

作者

  • 3 篇 lee chiou-yng
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 2 篇 poulakis dimitri...
  • 1 篇 abbdal salah h.
  • 1 篇 breveglieri luca
  • 1 篇 jin chunhua
  • 1 篇 hamadouche m'ham...
  • 1 篇 dhir renu
  • 1 篇 rui hu
  • 1 篇 zhu ting-le
  • 1 篇 akkaya kemal
  • 1 篇 rached tourki
  • 1 篇 mohsen machhout
  • 1 篇 fethi filali
  • 1 篇 poulakis d.
  • 1 篇 yassin ali a.
  • 1 篇 elemam eman
  • 1 篇 varalakshmi peru...
  • 1 篇 el-razouk hayssa...

语言

  • 41 篇 英文
检索条件"主题词=elliptic curve digital signature algorithm"
41 条 记 录,以下是1-10 订阅
排序:
A blind digital signature scheme using elliptic curve digital signature algorithm
收藏 引用
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 2013年 第4期21卷 945-956页
作者: Butun, Ismail Demiren, Mehmet Univ S Florida Fac Engn Dept Elect Engn Tampa FL USA Hacettepe Univ Fac Engn Dept Elect Engn Ankara Turkey
In this study, we propose a blind digital signature (BDS) scheme based on the elliptic curve digital signature algorithm that increases the performance significantly. The security of our scheme is based on the difficu... 详细信息
来源: 评论
Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and elliptic curve digital signature algorithm
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第1期124卷 655-670页
作者: Yuvaraj, N. Praghash, K. Karthikeyan, T. ICT Acad Chennai Tamil Nadu India Koneru Lakshmaiah Educ Fdn Dept Elect & Commun Engn Vaddeswaram AP India Univ Technol & Appl Sci Dept Elect & Telecommun Engn Higher Coll Technol Muscat Oman
The privacy and utility are treated as a major factor in influencing the role of data privacy preservation in cloud environments. There exists a trade-off between these two factors, where one factor should compromise ... 详细信息
来源: 评论
A new enhancement of elliptic curve digital signature algorithm
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2020年 第3期23卷 743-757页
作者: Mehibel, Nissa Hamadouche, M'hamed Univ MHamed Bougara Boumerdes LIMOSE Lab Fac Sci Independence Ave Boumerdes 35000 Algeria
elliptic curve digital signature algorithm (ECDSA) is a public key cryptographic algorithm based on the hardness of the elliptic curve Discrete Logarithm Problem (ECDLP), it is used to ensure users' authentication... 详细信息
来源: 评论
FPGA Implementation of elliptic curve digital signature algorithm Based on PUFs
FPGA Implementation of Elliptic Curve Digital Signature Algo...
收藏 引用
9th International Conference on Signal and Image Processing (ICSIP)
作者: Zhang, Hao Liu, Xuankai Li, Bing Southeast Univ Sch Integrated Circuit Nanjing Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China
In recent years, with the explosive growth of information, incidents threatening information security such as significant information leaks and personal privacy attacks have been constantly emerging. Research on publi... 详细信息
来源: 评论
Novel Trace-Based Construction of the Parallel-In-Serial-Out Multiplication for elliptic curve digital signature algorithm Like Binary Extension Fields  9
Novel Trace-Based Construction of the Parallel-In-Serial-Out...
收藏 引用
9th IEEE Annual Computing and Communication Workshop and Conference (CCWC)
作者: El-Razouk, Hayssam Calif State Univ Fresno Dept Elect & Comp Engn Fresno CA 93740 USA
The Gaussian normal bases (GNBs) recommended by the National Institute of Standards and Technology (NIST) for the five binary extension fields of the elliptic curve digital signature algorithm (ECDSA), are self-dual. ... 详细信息
来源: 评论
Implementation of elliptic curve digital signature algorithm (ECDSA)
Implementation of Elliptic Curve Digital Signature Algorithm...
收藏 引用
Global Summit on Computer and Information Technology (GSCIT)
作者: Abidi, Abdessalem Bouallegue, Belgacem Kahri, Fatma Fac Sci Monastir Elect & Microelect Lab EEL Monastir Tunisia
The elliptic curve cryptosystems are paid more and more attention because its key string is shorter and its security is better than other public cryptosystems. The digital signature system based on elliptic curve (ECD... 详细信息
来源: 评论
A Secure elliptic curve digital signature Scheme for Embedded Devices
A Secure Elliptic Curve Digital Signature Scheme for Embedde...
收藏 引用
2nd International Conference on Signals, Circuits and Systems
作者: Wajih, El Hadj Youssef Mohsen, Machhout Rached, Tourki Elect & Microelect Lab Dept Phys Fac Sci Monastir Monastir Tunisia
Random numbers are fundamental to all aspects of data security. The strength of a security mechanism is directly proportional to the randomness of the numbers it uses. These numbers are provided by special algorithms ... 详细信息
来源: 评论
Securing the edge: privacy-preserving federated learning for insider threats in IoT networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-49页
作者: Kamatchi, K. Uma, E. Anna Univ Coll Engn Guindy Dept Informat Sci & Technol Chennai 600025 India
Insider threats in Internet of Things (IoT) networks pose significant risks, as compromised devices can misuse their privileges to cause substantial harm. Centralized methods for insider threat detection in IoT device... 详细信息
来源: 评论
A simple and rapid authentication protocol in mobile networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2014年 第12期7卷 2596-2601页
作者: Guo, Ming-Huang Shih Hsin Univ Dept Informat Management Taipei Taiwan
Recently, mobile networks are more and more popular in providing the most pursuing pervasive networking services. Many technologies are deployed in mobile networks, such as Universal Mobile Telecommunication System (U... 详细信息
来源: 评论
Crypto-based algorithms for secured medical image transmission
收藏 引用
IET INFORMATION SECURITY 2015年 第6期9卷 365-373页
作者: Al-Haj, Ali Abandah, Gheith Hussein, Noor Princess Sumaya Univ Comp Engn Amman 11941 Jordan Univ Jordan Comp Engn Amman Jordan Balqa Appl Univ Comp Engn Salt Jordan
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, c... 详细信息
来源: 评论